On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Secure network cloud architecture

BT Spiers, M Halas, RA Schimmel… - US Patent …, 2015 - Google Patents
Apparatuses, computer readable media, methods, and systems are described for requesting
creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud …

Locking the sky: a survey on IaaS cloud security

LM Vaquero, L Rodero-Merino, D Morán - Computing, 2011 - Springer
Cloud computing is expected to become a common solution for deploying applications
thanks to its capacity to leverage developers from infrastructure management tasks, thus …

Secure network cloud architecture

BT Spiers, M Halas, RA Schimmel… - US Patent …, 2014 - Google Patents
Apparatuses, computer readable media, methods, and sys tems are described for
requesting creation of virtual machine (VM) in a cloud environment comprising a virtual …

TVDc: managing security in the trusted virtual datacenter

S Berger, R Cáceres, D Pendarakis, R Sailer… - ACM SIGOPS …, 2008 - dl.acm.org
Virtualization technology is becoming increasingly common in datacenters, since it allows
for collocation of multiple workloads, consisting of operating systems, middleware and …

Virtual gateways for isolating virtual machines

DS Dodgson, R Farina, JA Fontana… - US Patent …, 2017 - Google Patents
Virtual machines in a network may be isolated by encrypting transmissions between the
virtual machines with keys possessed only by an intended recipient. Within a network, the …

Virtual network security: threats, countermeasures, and challenges

LR Bays, RR Oliveira, MP Barcellos… - Journal of Internet …, 2015 - Springer
Network virtualization has become increasingly prominent in recent years. It enables the
creation of network infrastructures that are specifically tailored to the needs of distinct …

Security for the cloud infrastructure: Trusted virtual data center implementation

S Berger, R Cáceres, K Goldman… - IBM Journal of …, 2009 - ieeexplore.ieee.org
The trusted virtual data center (TVDc) is a technology developed to address the need for
strong isolation and integrity guarantees in virtualized environments. In this paper, we …

[PDF][PDF] A survey on virtual network embedding in cloud computing centers

X Wei, S Hu, H Li, F Yang, Y Jin - The Open Automation and …, 2014 - benthamopen.com
Bridging virtualized environments with physical environments, virtual network plays an
important role in Cloud Computing infrastructures. How to allocate physical resources for …

{Hyper-Switch}: A Scalable Software Virtual Switching Architecture

KK Ram, AL Cox, M Chadha, S Rixner - 2013 USENIX Annual Technical …, 2013 - usenix.org
In virtualized datacenters, the last hop switching happens inside a server. As the number of
virtual machines hosted on the server goes up, the last hop switch can be a performance …